Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Data-Oriented Operating System for Big Data and Cloud

    Selwyn Darryl Kessler, Kok-Why Ng*, Su-Cheng Haw*

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 633-647, 2024, DOI:10.32604/iasc.2024.054154

    Abstract Operating System (OS) is a critical piece of software that manages a computer’s hardware and resources, acting as the intermediary between the computer and the user. The existing OS is not designed for Big Data and Cloud Computing, resulting in data processing and management inefficiency. This paper proposes a simplified and improved kernel on an x86 system designed for Big Data and Cloud Computing purposes. The proposed algorithm utilizes the performance benefits from the improved Input/Output (I/O) performance. The performance engineering runs the data-oriented design on traditional data management to improve data processing speed by… More >

  • Open Access

    ARTICLE

    A Data-Oriented Method to Optimize Hydraulic Fracturing Parameters of Tight Sandstone Reservoirs

    Zhengrong Chen*, Mao Jiang, Chuanzhi Ai, Jianshu Wu, Xin Xie

    Energy Engineering, Vol.121, No.6, pp. 1657-1669, 2024, DOI:10.32604/ee.2024.030222

    Abstract Based on the actual data collected from the tight sandstone development zone, correlation analysis using the Spearman method was conducted to determine the main factors influencing the gas production rate of tight sandstone fracturing. An integrated model combining geological engineering and numerical simulation of fracture propagation and production was completed. Based on data analysis, the hydraulic fracture parameters were optimized to develop a differentiated fracturing treatment adjustment plan. The results indicate that the influence of geological and engineering factors in the X1 and X2 development zones in the study area differs significantly. Therefore, it is… More >

  • Open Access

    ARTICLE

    Machine Learning Security Defense Algorithms Based on Metadata Correlation Features

    Ruchun Jia, Jianwei Zhang*, Yi Lin

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2391-2418, 2024, DOI:10.32604/cmc.2024.044149

    Abstract With the popularization of the Internet and the development of technology, cyber threats are increasing day by day. Threats such as malware, hacking, and data breaches have had a serious impact on cybersecurity. The network security environment in the era of big data presents the characteristics of large amounts of data, high diversity, and high real-time requirements. Traditional security defense methods and tools have been unable to cope with the complex and changing network security threats. This paper proposes a machine-learning security defense algorithm based on metadata association features. Emphasize control over unauthorized users through… More >

Displaying 1-10 on page 1 of 3. Per Page